{"title":"Security Issues, Vulnerabilities and Countermeasures in Information Communication Technology and Signal Processing","authors":"Akshay Goel, Jayesh Gaur, Ajay Rose","doi":"10.1109/ICSPC46172.2019.8976734","DOIUrl":null,"url":null,"abstract":"This paper discusses the heavy usage of source software which is free and open was because of the fact that it had many advantages associated with it like it was a cost saving and fast method but we know that everything has some disadvantages associated with it, this was also the case with the heavy usage of above discussed source software, it brought many vulnerabilities with it and researchers are still struggling to find a method of dealing with these vulnerabilities. Vulnerabilities are not only present in such open source software's, it is also present in outsourcing of Information Communication Technology (ICT). The algorithm of signal processing is also discussed in the paper. Various applications of signal processing are also discussed in the paper. The last section of the paper throws light on the challenges and goals of sensor network security. Finally, the paper concludes discussing the security vulnerabilities in ICT and signal processing.","PeriodicalId":321652,"journal":{"name":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 2nd International Conference on Signal Processing and Communication (ICSPC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSPC46172.2019.8976734","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper discusses the heavy usage of source software which is free and open was because of the fact that it had many advantages associated with it like it was a cost saving and fast method but we know that everything has some disadvantages associated with it, this was also the case with the heavy usage of above discussed source software, it brought many vulnerabilities with it and researchers are still struggling to find a method of dealing with these vulnerabilities. Vulnerabilities are not only present in such open source software's, it is also present in outsourcing of Information Communication Technology (ICT). The algorithm of signal processing is also discussed in the paper. Various applications of signal processing are also discussed in the paper. The last section of the paper throws light on the challenges and goals of sensor network security. Finally, the paper concludes discussing the security vulnerabilities in ICT and signal processing.